Topic 2: . Asset Security
Which of the following is MOST important when assigning ownership of an asset to a
department?
A.
The department should report to the business owner
B.
Ownership of the asset should be periodically reviewed
C.
Individual accountability should be ensured
D.
All members should be trained on their responsibilities
All members should be trained on their responsibilities
Which one of the following affects the classification of data?
A.
Assigned security label
B.
Multilevel Security (MLS) architecture
C.
Minimum query size
D.
Passage of time
Passage of time
The use of private and public encryption keys is fundamental in the implementation of which of the following?
A.
Diffie-Hellman algorithm
B.
Secure Sockets Layer (SSL)
C.
Advanced Encryption Standard (AES)
D.
Message Digest 5 (MD5)
Secure Sockets Layer (SSL)
What is the second phase of Public Key Infrastructure (PKI) key/certificate life-cycle management?
A.
Implementation Phase
B.
Initialization Phase
C.
Cancellation Phase
D.
Issued Phase
Issued Phase
Which technique can be used to make an encryption scheme more resistant to a known plaintext attack?
A.
Hashing the data before encryption
B.
Hashing the data after encryption
C.
Compressing the data after encryption
D.
Compressing the data before encryption
Compressing the data before encryption
Page 4 out of 298 Pages |
Previous |